Per the FBI website: Good afternoon Chairman Johnson, Ranking Member Carper, and members of the committee. Thank you for the opportunity to appear before you today to discuss the current threats to the homeland and our efforts to address new challenges, including terrorists’ use of technology to communicate—both to inspire and recruit. The widespread use of technology propagates the persistent terrorist message to attack U.S. interests whether in the homeland or abroad. As the threat to harm Western interests evolves, we must adapt and confront the challenges, relying heavily on the strength of our federal, state, local, and international partnerships. Our successes depend on interagency cooperation. We work closely with our partners within the Department of Homeland Security and the National Counterterrorism Center to address current and emerging threats. Counterterrorism Counterterrorism remains the FBI’s top priority, however, the threat has changed in two significant ways. First, the core al Qaeda tumor has been reduced, but the cancer has metastasized. The progeny of al Qaeda—including AQAP, al Qaeda in the Islamic Maghreb, and the Islamic State of Iraq and the Levant (ISIL)—have become our focus. Secondly, we are confronting the explosion of terrorist propaganda and training on the Internet. It is no longer necessary to get a terrorist operative into the United States to recruit. Terrorists, in ungoverned spaces, disseminate poisonous propaganda and training materials to attract troubled souls around the world to their cause. They encourage these individuals to travel, but if they can’t travel, they motivate them to act at home. This is a significant change from a decade ago. We continue to identify individuals who seek to join the ranks of foreign fighters traveling in support of ISIL, and also homegrown violent extremists who may aspire to attack the United States from within. These threats remain among the highest priorities for the FBI and the Intelligence Community as a whole. Conflicts in Syria and Iraq continue to serve as the most attractive overseas theaters for Western-based extremists who want to engage in violence. We estimate approximately 250 Americans have traveled or attempted to travel to Syria to participate in the conflict. While this number is lower in comparison to many of our international partners, we closely analyze and assess the influence groups like ISIL have on individuals located in the United States who are inspired to commit acts of violence. Whether or not the individuals are affiliated with a foreign terrorist organization and are willing to travel abroad to fight or are inspired by the call to arms to act in their communities, they potentially pose a significant threat to the safety of the United States and U.S. persons. ISIL has proven relentless in its violent campaign to rule and has aggressively promoted its hateful message, attracting like-minded extremists to include Westerners. To an even greater degree than al Qaeda or other foreign terrorist organizations, ISIL has persistently used the Internet to communicate. From a homeland perspective, it is ISIL’s widespread reach through the Internet and social media which is most concerning as ISIL has aggressively employed this technology for its nefarious strategy. ISIL blends traditional media platforms, glossy photos, in-depth articles, and social media campaigns that can go viral in a matter of seconds. No matter the format, the message of radicalization spreads faster than we imagined just a few years ago. Unlike other groups, ISIL has constructed a narrative that touches on all facets of life—from career opportunities to family life to a sense of community. The message isn’t tailored solely to those who are overtly expressing symptoms of radicalization. It is seen by many who click through the Internet every day, receive social media push notifications, and participate in social networks. Ultimately, many of these individuals are seeking a sense of belonging. As a communication medium, social media is a critical tool for terror groups to exploit. One recent example occurred when an individual was arrested for providing material support to ISIL by facilitating an associate’s travel to Syria to join ISIL. The arrested individual had multiple connections, via a social media networking site, with other like-minded individuals. There is no set profile for the susceptible consumer of this propaganda. However, one trend continues to rise—the inspired youth. We’ve seen certain children and young adults drawing deeper into the ISIL narrative. These individuals are often comfortable with virtual communication platforms, specifically social media networks. ISIL continues to disseminate their terrorist message to all social media users—regardless of age. Following other groups, ISIL has advocated for lone offender attacks. In recent months ISIL released a video, via social media, reiterating the group’s encouragement of lone offender attacks in Western countries, specifically advocating for attacks against soldiers and law enforcement, intelligence community members, and government personnel. Several incidents have occurred in the United States and Europe over the last few months that indicate this “call to arms” has resonated among ISIL supporters and sympathizers. In one case, a New York-based male was arrested in September after he systematically attempted to travel to the Middle East to join ISIL. The individual, who was inspired by ISIL propaganda, expressed his support for ISIL online and took steps to carry out acts encouraged in the ISIL call to arms. The targeting of U.S. military personnel is also evident with the release of names of individuals serving in the U.S. military by ISIL supporters. The names continue to be posted to the Internet and quickly spread through social media, depicting ISIL’s capability to produce viral messaging. Threats to U.S. military and coalition forces continue today. Social media has allowed groups, such as ISIL, to use the Internet to spot and assess potential recruits. With the widespread horizontal distribution of social media, terrorists can identify vulnerable individuals of all ages in the United States—spot, assess, recruit, and radicalize—either to travel or to conduct a homeland attack. The foreign terrorist now has direct access into the United States like never before. In other examples of arrests, a group of individuals was contacted by a known ISIL supporter who had already successfully traveled to Syria and encouraged them to do the same. Some of these conversations occur in publicly accessed social networking sites, but others take place via private messaging platforms. As a result, it is imperative the FBI and all law enforcement organizations understand the latest communication tools and are positioned to identify and prevent terror attacks in the homeland. We live in a technologically driven society and just as private industry has adapted to modern forms of communication so too have terrorists. Unfortunately, changing forms of Internet communication and the use of encryption are posing real challenges to the FBI’s ability to fulfill its public safety and national security missions. This real and growing gap, to which the FBI refers as “Going Dark,” is an area of continuing focus for the FBI; we believe it must be addressed given the resulting risks are grave both in both traditional criminal matters as well as in national security matters. The United States government is actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services. However, the administration is not seeking legislation at this time. The FBI is utilizing all lawful investigative techniques and methods to combat the threat these individuals may pose to the United States. In conjunction with our domestic and foreign partners, we are rigorously collecting and analyzing intelligence information as it pertains to the ongoing threat posed by foreign terrorist organizations and homegrown violent extremists. We continue to encourage robust information sharing; in partnership with our many federal, state, and local agencies assigned to Joint Terrorism Task Forces around the country, we remain vigilant to ensure the safety of the American public. Be assured, the FBI continues to pursue increased efficiencies and information sharing processes as well as pursue technological and other methods to help stay ahead of threats to the homeland. Intelligence Integrating intelligence and operations is part of the broader intelligence transformation the FBI has undertaken in the last decade. We are making progress, but have more work to do. We have taken two steps to improve this integration. First, we have established an Intelligence Branch within the FBI headed by an executive assistant director (EAD). The EAD looks across the entire enterprise and drives integration. Second, we now have special agents and new intelligence analysts at the FBI Academy engaged in practical training exercises and taking core courses together. As a result, they are better prepared to work well together in the field. Our goal every day is to get better at using, collecting and sharing intelligence to better understand and defeat our adversaries. The FBI cannot be content to just work what is directly in front of us. We must also be able to understand the threats we face at home and abroad and how those threats may be connected. Towards that end, intelligence is gathered, consistent with our authorities, to help us understand and prioritize identified threats and to determine where there are gaps in what we know about these threats. We then seek to fill those gaps and learn as much as we can about the threats we are addressing and others on the threat landscape. We do this for national security and criminal threats, on both a national and local field office level. We then compare the national and local perspectives to organize threats into priority for each of the FBI’s 56 field offices. By categorizing threats in this way, we strive to place the greatest focus on the gravest threats we face. This gives us a better assessment of what the dangers are, what’s being done about them, and where we should prioritize our resources. Cyber An element of virtually every national security threat and crime problem the FBI faces is cyber-based or facilitated. We face sophisticated cyber threats from state-sponsored hackers, hackers for hire, organized cyber syndicates, and terrorists. On a daily basis, cyber-based actors seek our state secrets, our trade secrets, our technology, and our ideas—things of incredible value to all of us and of great importance to the conduct of our government business and our national security. They seek to strike our critical infrastructure and to harm our economy. We continue to see an increase in the scale and scope of reporting on malicious cyber activity that can be measured by the amount of corporate data stolen or deleted, personally identifiable information compromised, or remediation costs incurred by U.S. victims. For example, as the committee is aware, the Office of Personnel Management (OPM) discovered earlier this year that a number of its systems were compromised. These systems included those that contain information related to the background investigations of current, former, and prospective Federal government employees, as well as other individuals for whom a federal background investigation was conducted. The FBI is working with our interagency partners to investigate this matter. FBI agents, analysts, and computer scientists are using technical capabilities and traditional investigative techniques—such as sources, court-authorized electronic surveillance, physical surveillance, and forensics—to fight cyber threats. We are working side-by-side with our federal, state, and local partners on Cyber Task Forces in each of our 56 field offices and through the National Cyber Investigative Joint Task Force (NCIJTF), which serves as a coordination, integration, and information sharing center for 19 U.S. agencies and several key international allies for cyber threat investigations. Through CyWatch, our 24-hour cyber command center, we combine the resources of the FBI and NCIJTF, allowing us to provide connectivity to federal cyber centers, government agencies, FBI field offices and legal attachés, and the private sector in the event of a cyber intrusion. We take all potential threats to public and private sector systems seriously and will continue to investigate and hold accountable those who pose a threat in cyberspace. * * * Finally, the strength of any organization is its people. The threats we face as a nation have never been greater or more diverse and the expectations placed on the Bureau have never been higher. Our fellow citizens look to us to protect the United States from all of those threats and the men and women of the Bureau continue to meet—and exceed—those expectations, every day. I want to thank them for their dedication and their service. Chairman Johnson, Ranking Member Carper, and committee members, I thank you for the opportunity to testify concerning the threats to the homeland and terrorists’ use of the Internet and social media as a platform for spreading ISIL propaganda and inspiring individuals to target the homeland, and the impact of the Going Dark problem on mitigating their efforts. I am happy to answer any questions you might have.
|
|
Author Archives: Denise Simon
Delivered Documents Go Deeper on Clintons’
There is no longer doubt that certain personnel at the State Department were in collusion with the Clintons, but this time on the Foundation side and with regard to Bill giving speeches for big money.
Each time there was a speech request for Bill, the procedure was to pass the full speech application request to the State Department to determine if the sponsors were acceptable and approved. A database is maintained at State for diplomatic purposes on global and domestic corporations such that the speech requests would be only somewhat investigated. This also gives rise to the fact that government and especially corporations use the State Department and likewise in reverse to advance mutual relationships, agendas and of course money is always involved. Thanks to Judicial Watch for their tireless work as noted below.
Clinton Cash Connections Exposed – New Docs Raise Questions On Clinton Conflicts of Interest
The Clinton email scandal is serious enough. Nonetheless, it is useful to remember what exactly Mrs. Clinton was trying to hide before our litigation forced the disclosure of her separate email system. You can bet that the cover up of the depth of her abuse of office for private gain is one thing about which she does not want you to know the full truth. Judicial Watch is in the lead in uncovering these Clinton cash abuses. This week, we released 789 pages of State Department “ethics” review documents concerning former Secretary of State Hillary Clinton, revealing that at least one speech by Bill Clinton appeared to take place without the required State Department ethics approval. The documents also include a copy of Bill Clinton’s draft consultant agreement with Laureate Education, Inc., which was submitted for ethics review by the State Department. But the State Department redacted the information regarding compensation and the specific services Bill Clinton was hired to provide to the controversial “for profit” education company. The documents were released as a result of a federal court order in our history-making Freedom of Information Act (FOIA) lawsuit filed against the State Department on May 28, 2013, (Judicial Watch v. U.S. Department of State (No. 1:13-cv-00772)). The documents include heavily redacted emails from 2009 about the review of a speech Bill Clinton was set to give to the Institute of Scrap Recycling Industries (ISRI). An April 1, 2009, email from then-State Department Senior Ethics Counsel Waldo W. “Chip” Brooks notes that the ethics review approval of the speech “was in the hands of Jim [Thessin] and Cheryl Mills. They were to discuss with Counsel to the former President. I do not know if either ever did.” A follow-up September 1, 2009, email to Brooks from a colleague asks, “[W]as there ever a decision on the Clinton request involving scrap recycling? Below is the last e-mail I have on it – I assume it just died since I don’t’ have an outgoing memo approving the event …” Brooks responds two minutes later:
“I think the decision was a soft call to Clinton’s attorney and the talk did not take place. You might want to send an email to [Clinton Foundation Director of Scheduling and Advance] Terry [Krinvic] and tell her that you have a gap in your records because you were gone and wanted to know if the President ever did talk before ISRI?
In fact, Bill Clinton spoke to the scrap recycling group on April 30, 2009, for a reported fee off $250,000. The documents also include a request from Doug Band of the Clinton Foundation for an ethics review of Mr. Clinton’s proposed consulting arrangement, through WJC LLC, with Laureate Education, Inc. The Obama State Department redacted key terms of the attached May 1, 2010, draft agreement, including Mr. Clinton’s fees and the nature of Mr. Clinton’s services. Laureate Education, Inc. is the world’s largest, for-profit, international higher education chain and reportedly uses many of the same practices that spurred a 2014 regulatory crackdown by the Obama administration on for-profit colleges in the United States. In 2010, according to The Washington Post, the company hired former President Clinton to serve as its honorary chancellor, and since that time the former president has made more than a dozen appearances in countries such as Malaysia, Peru, and Spain on the company’s behalf. Since 2010, the former president reportedly has been paid more than $16 million from the company for his services. The Clinton-Laureate connection is rich. The Daily Caller did some digging into the Clinton tax returns that were highly revealing:
Clinton signed on as the honorary chancellor of Laureate International Universities, a subsidiary of Laureate Education, in 2010. Despite the honorary nature of his position, that didn’t stop the company from paying him on average approximately $3 million a year. The investment likely paid off, though, as Clinton has lent Laureate significant legitimacy and has served as an advocate for the company overseas, making appearance in countries like Peru and Malaysia to praise it. In addition to these direct payments, Laureate also donated to the Clinton Foundation and has cooperated with the Clinton Global Initiative.
The latest State Department documents also show some push-back by ethics officials concerning proposed Clinton speeches to Chinese government-linked entities. State Department officials, for example, had several questions about a proposed 2009 speech to a subsidiary of the Shanghai Sports Development Corporation, a Chinese “quasi-government” agency. Rather than answer the questions, the Clinton Foundation representative emailed “we are not going to proceed with this.” State Department ethics official “Chip” Brooks commented on the withdrawal of the Chinese speech in December 2009 to then-Deputy Legal Adviser Jim Thessin, “Cooler heads have prevailed.” The documents show the State Department approved scores of requests by former President Bill Clinton to appear as the featured speaker at events sponsored by some of the world’s leading international investment and banking firms, including J.P. Morgan, Barclays, Merrill Lynch, Sweden’s ABG, PriceWaterhouseCoopers, Brazil’s Banco Itau, Vista Equity Partners, Goldman Sachs, Vanguard Group (described as “one of the world’s largest investment management companies”), Canada’s Imperial Bank of Commerce, and Saudi Arabia’s SAGIA conglomerate (which claims to be the “gateway to investments in Saudi Arabia”). While the majority of the documents do not contain the fees that Clinton charged for his speaking services, those that are disclosed reveal that the former president routinely received six-figure honorariums for his advice to the international investment counseling firms and banking institutions, including:
- Barclays Capital Singapore – $325,000 • Needham Partners South Africa – $350,000 • Cumbre de Negocios (sponsored by Nacional Financiera and El Banco Fuerte de Mexico) – $275,000 and $125,000) • NTRPLC (which describes itself as “developing a new investment portfolio of wind projects in Ireland and the UK”) – $125,000
The documents reveal that between 2009 and 2011, former President Clinton spoke to more than two dozen leading international investment firms and banking institutions, many of them on more than one occasion. At least one of the documents shows that Hillary Clinton Chief of Staff Cheryl Mills used a non-governmental email account for the Clinton ethics reviews. Mills reportedly negotiated the “ethics agreement” on behalf of the Clintons and the Foundation that required the Clintons to submit to rigorous conflict-of-interest checks. Despite this, and in apparent violation of Obama administration ethics rules, the documents reveal that Bill Clinton’s requests for speaking engagement approval were invariably copied to Mills, who was involved in ethics reviews as chief of staff for Mrs. Clinton at the State Department. The documents also include the demands that Bill Clinton’s speakers bureau, The Harry Walker Agency, laid out for a speech sponsor in Slovenia. Notably, the documents require that press be kept in a “designated, roped off area in the back of the room with a staff escort” and that the “press should not be given access to any area where the President likely may be.” This JW lawsuit broke open the Clinton cash scandal by forcing the disclosure of documents that provided a road map for over 200 conflict-of-interest rulings that led to at least $48 million for the Clintons and the Clinton Foundation during Hillary Clinton’s tenure as secretary of State. Previously disclosed documents in this lawsuit, for example, raise questions about funds Clinton accepted from entities linked to Saudi Arabia, China and Iran, among others. This and other JW lawsuits on Benghazi were the key pressure that forced the disclosure of the Clinton email system. Judicial Watch’s litigation to obtain these conflict of interest records is ongoing. The State Department has yet to search the email records Mrs. Clinton purportedly turned over to the agency last year, despite Judicial Watch’s first requesting these records in 2011 and filing this lawsuit in 2013. The State Department also has yet to explain why it failed to conduct a proper, timely search in the 20 months between when it received our request on May 2, 2011, and February 1, 2013, when Secretary Clinton left office. Judicial Watch also is pressing the State Department to conduct a reasonable search for records, including any emails on the Hillary Clinton email server. On September 3, Judicial Watch filed a request with the court for discovery from the State Department and/or Mrs. Clinton in order to find these records so they might finally be searched as the law requires. Specifically, Judicial Watch’s attorneys ask the court to take steps to obtain the records directly:
To the extent Secretary Clinton or her agents or vendors continue to have access to this agency system of records, or any records from the system that have migrated or been transferred to any new servers, storage devices, or back-up systems, Judicial Watch respectfully submits that a constructive trust must be imposed on any such records and systems so that the State Department can access and search them for records…
Accordingly, Judicial Watch asks the court to order the State Department:
To identify, either through declarations or discovery, all information in its possession or control about the transfer of any data from the “clintonemail.com” server to Secretary Clinton’s vendor and whether any such data is still available or otherwise recoverable from the vendor’s server, storage devices, or back-up systems. If the State Department asserts that it does not have this information or cannot obtain it, limited third-party discovery of Secretary Clinton and/or her vendor should be authorized to enable the Court to obtain the information, which is necessary to remedy the State Department’s failure to search the server during Secretary Clinton’s tenure in office, its further failure to secure all federal records on the server when Secretary Clinton left office, and Secretary Clinton’s wrongful retention of these records after she left office.
Judicial Watch’s court filing details how it was “wrongful and in violation of federal law and State Department regulations” to allow Hillary Clinton “to retain exclusive access to this agency system of records (Clinton’s separate email server) and the official State Department communications and records it contains after she left office on February 1, 2013.” In short, we’re asking the court to allow us to figure out where the Clinton documents are and to take steps to make sure they are preserved and searched as the law requires. These records show that the “ethics reviews” of Bill and Hillary Clinton’s potential conflicts of interest was a joke. JW supporters should be proud of how their support resulted in a lawsuit that helped force the disclosure of Hillary Clinton’s separate email system. And now we hope that it results in getting all the Clinton emails searched to find out what else Hillary Clinton didn’t want the American people to see about her shady dealings. Judicial Watch’s FOIA lawsuit has become particularly noteworthy because it has been reported that the Clinton Foundation, now known as the Bill, Hillary, & Chelsea Clinton Foundation, accepted millions of dollars from at least seven foreign governments while Mrs. Clinton served as secretary of State. The Clinton Foundation has acknowledged that a $500,000 donation it received from the government of Algeria while Mrs. Clinton served as secretary of State violated a 2008 ethics agreement between the foundation and the Obama administration. Some of the foreign governments that have made donations to the Clinton Foundation include Algeria, Kuwait, Qatar, and Oman, have questionable human rights records. Links to the full production of documents can be found here: May 4, 2015; June 15, 2015; July 27, 2015 and September 4, 2015. Feel free to review the documents and let us know if you find anything important that we might have missed!
Hello FBI, What about this $125 Billion?
Where is the U.S. Department of Treasury? Where is the White House? (rhetorical)
By the hour scandals come out of the Federal government where the reaction is: ‘it is under investigation’ or we have created a task force to advise on how to correct the issue or it was due to a computer glitch.
Never do we hear that someone is going to prison for malfeasance or theft or obstruction.
So how about putting pressure on the White House to call in the FBI, build the case and then move to a criminal case? Sounds great huh? Maybe even House of Cards will do a whole series on the waste, fraud and corruption, after all it is revenue generating right? Oh…one more thing, whistleblowers have a very short life and career span in Washington DC, but there are laws where Federal employees must comply and report waste, fraud and abuse….well so it goes.
Well back to the $125 billion, while that was only LAST year.
A number of strategies, including implementing preventive controls and addressing GAO’s prior recommendations, can help agencies reduce improper payments, which have been a persistent, government-wide issue. The improper payment estimate, attributable to 124 programs across 22 agencies in fiscal year 2014, was $124.7 billion, up from $105.8 billion in fiscal year 2013. The almost $19 billion increase was primarily due to the Medicare, Medicaid, and Earned Income Tax Credit programs, which account for over 75 percent of the government-wide improper payment estimate. Federal spending in Medicare and Medicaid is expected to significantly increase, so it is critical that actions are taken to reduce improper payments in these programs. Moreover, for fiscal year 2014, federal entities reported estimated error rates for 10 risk-susceptible programs that exceeded 10 percent. Recent laws and guidance have focused attention on improper payments, but incomplete or understated estimates and noncompliance with criteria listed in federal law hinder the government’s ability to assess the full extent of improper payments and implement strategies to reduce them. For example, for fiscal year 2014, 2 federal agencies did not report improper payment estimates for 4 risk-susceptible programs, and 5 programs with improper payment estimates greater than $1 billion were noncompliant with federal requirements for 3 consecutive years. Identifying root causes of improper payments can help agencies target corrective actions, and GAO has made numerous recommendations that could help reduce improper payments. For example, strengthening verification of Medicare providers and suppliers could help reduce improper payments. GAO has stated that continued agency attention is needed to (1) identify susceptible programs, (2) develop reliable estimation methodologies, (3) report as required, and (4) implement effective corrective actions based on root cause analysis. Absent such continued efforts, the federal government cannot be assured that taxpayer funds are adequately safeguarded. The full report is here.
Government burns $125B in improper payments, GAO says
A Government Accountability Office report found that the federal government racked up more than $124 billion in improper payments in 2014, $19 billion above the previous year.
The Oct. 1 report found that the surge in payments came almost exclusively from Medicare, Medicaid, and Earned Income Tax Credit programs, which account for 75 percent of improper payments across the federal government.
“Federal spending in Medicare and Medicaid is expected to significantly increase, so it is critical that actions are taken to reduce improper payments in these programs,” the report said.
Improper payments include things like overpayments, underpayments or payments made for goods and services not received.
GAO estimated that since agencies began reporting improper payments in 2003, $1 trillion in federal funding has been lost to the issue.
The report called for greater compliance from government agencies, citing findings that five federal programs with more than $1 billion in improper payments were noncompliant with federal law for three years.
U.S. Comptroller General Gene Dodaro testified before the Senate Committee on Finance on Oct. 1 to address the report’s findings as well as GAO’s recommendations.
“Reducing improper payments is critical to safeguarding federal funds and could help achieve cost savings and improve the government’s fiscal position,” Dodaro said in testimony.
The report noted that Medicaid and Medicare accounted for $77.4 billion in improper benefits in 2014. To fix the problem, GAO suggested the Centers for Medicare and Medicaid improve Medicare automated audits, track postpayment recovery audit activities, remove Social Security numbers from Medicare cards to help prevent fraud and other reforms.
GAO recommended improving efficiency and oversight for Medicaid, including tracking liability for third-party insurers. CMS concurred with the recommendations and, in some cases, was already working on implementation plans for them.
The other big source of improper payments identified in the report was from the Earned Income Tax Credit, a refundable tax credit for low- to moderate-income earners, particularly those with children.
The report identified $17.7 billion in improper payments related to EITC, largely to due to the credit being incorrectly claimed on tax returns.
“As we have reported, a root cause of EITC noncompliance is that eligibility is determined by taxpayers themselves or their tax return preparers and that IRS’s ability to verify eligibility before issuing refunds is limited,” the report said.
Dodaro said that while the some fraud could play a role in improper EITC payments, the complexity of tax law has led to mistaken applications, which perpetuate improper payments.
“Complexity is definitely the heart of the problem here with the error rates,” he said. “We’re not suggesting they be made more complex. What we are suggesting is that Congress regulate paid tax preparers.”
Dodaro cited Oregon’s practice of regulating paid tax preparers, which originated in the 1970s, and pointed to a 2008 study that found Oregon tax returns are 72 percent more likely to be accurate than a comparable return from paid preparers in other states.
Read the report here.
Who the Hell is Rick Gladstone?
Does anyone….anyone really take some of the editorials printed by the New York Times seriously? Do the editors there even go through a committee approval process? Is J Street, the lobby group, a constant funder of the NYT’s or could it be CAIR (Council for American Islamic Relations) or could the NYT’s be in collusion with NIAC (National Iranian American Council) or could Rick Gladstone and his ‘g0-to’ experts be on additional payrolls?
Hey Rick, here is a documentary for you sir:
Maybe Gladstone is the roommate of Rashid Khalidi.
Well, read on and then you may have additional questions. Here is lies yet another example of revisionist history.
‘The New York Times’ Goes Truther on the Temple Mount
Was the White House ever in Washington, D.C.? Can we ever really know for sure? Not unless we dig under the existing structure and find indisputable archaeological evidence of the original structure, which British general Robert Ross is said—by some sources—to have torched in August, 1814.
If you find everything about the previous paragraph patently ridiculous, you are clearly not a reporter or an editor for The New York Times. This morning, the paper of record published a piece about Jerusalem’s Temple Mount, questioning whether or not it was the site of, you know, the Jewish Temple. “Historical Certainty,” the article’s headline reads, “Proves Elusive at Jerusalem’s Holiest Place.” Capping the piece is a quote from Jane Cahill, who the paper notes is not only an archaeologist but also a practicing lawyer and therefore, presumably, an expert on incontrovertible evidence. Did the ancient Jewish temple stand where the Dome of the Rock now stands? “The answer might be ‘yes,’ if the standard of proof is merely a preponderance of the evidence,” Cahill is quoted as saying, “but ‘no’ if the standard of proof is beyond a reasonable doubt.”
It’s hard to begin to dissect the Times’ potent blend of ignorance and malice. There’s reporter Rick Gladstone’s repulsive bad faith in continually moving back and forth in his text between the narrow question he seems to have asked Cahill and other scholars: did the Temples stand precisely on the exact spot on the Temple Mount where Aksa was built, or might they have stood, say 50 feet over? This, in addition to the idea, which Gladstone weaves in and out of the piece, that there is even the slightest credibility to the idea that “Jewish Temples” were, you know, the products of some kind of religious fever-dream that Zionists then appropriated for their own aggressive purposes.
To be fair, Gladstone’s ignorance is all-embracing. If you know anything about religious history—not Jewish, mind you, but Muslim—you know that the Dome of the Rock was built in its current spot by the Umayyad Caliphate in 692 C.E. precisely because it was sacred space and because it was the former spot of the Jewish temple, just like the Kaaba in Mecca became a shrine because of the belief (stated explicitly in chapter 2, verse 127 of the Koran) that it was built by Abraham.
But hey, never mind any of that. Never mind the physical existence of the Western Wall, which the Times mentions in passing in the fourth-to-last paragraph, even though the existence of an enormous external supporting wall directly below the site where the temple is said to have stood should sort of answer the question. Never mind plentiful Roman historical accounts of the structure built by Herod that was widely regarded as one of the wonders of the ancient world. And never mind the fact that among scholars who actually study this stuff, there is no controversy whatsoever about the existence of Jewish Temples on the Temple Mount in Jerusalem, anymore than any controversy that exists between Judaism and Islam on this point, or the fact that there is no contradiction between Jewish, Christian, Muslim, Roman or pagan sources. Don’t bother the Times with any of these facts: Just as long as it is possible to make any Jewish claim on Judaism’s holiest site seem like yet another irrational piece of fiction invented by feverish religious Jews, Zionists, and other troublemakers who are very unlike the good and logical and educated and clean Jews who read and write for the Times.
And so, because the paper of record won’t put it clearly, permit me the pleasure: Denying that a Jewish temple stood on the Temple Mount is not a form of historical argument. It is akin to denying that the earth is not flat. Or denying that global warming is real. Or that the evidence of human evolution is widely accepted by scholars. As far as history goes, it’s the equivalent of blowing up statues of the Buddha, or blowing up churches, or denying that the Holocaust ever happened. It’s an form of denialism, which seeks to obliterate evidence and basic standards of evidence in the service of some higher truth, which is rarely anything that the future is ever thankful for. It’s ugly. Paying lip-service to standards of historical proof while wildly mis-characterizing the views of scholars in the service of historical denialism turns the Times‘ basic ignorance here into something much uglier.
More TPP, Transpacific Partnership Pact Facts
During Hillary Clinton’s time as Secretary of State, she was for the TPP and now, well she has flipped on that position.
This is yet another shot across the bow of the White House where she is separating herself from Barack Obama, but is she really?
Hillary Clinton announced Wednesday that she opposes the Trans-Pacific Partnership trade deal.
“I’m continuing to learn about the details of the new Trans-Pacific Partnership, including looking hard at what’s in there to crack down on currency manipulation, which kills American jobs, and to make sure we’re not putting the interests of drug companies ahead of patients and consumers,” she said in a statement. “But based on what I know so far, I can’t support this agreement.”
At the end of the segment of Senator Rand Paul this week with Bret Baier on Fox, Paul describes some of the classified maneuvers of the TPP.
One particular group, left leaning for sure is WikiLeaks, who has been an interesting champion of trying to get all the details on the Transpacific Partnership Part.
Wikileaks has released the Intellectual Property Rights chapter of the controversial Trans-Pacific Partnership (TPP) agreement, which they claim contains rules and regulations that would have “wide-ranging effects on internet services, medicines, publishers, civil liberties and biological patents.”
The idea behind the TPP is free trade – amongst the member states, it aims to lower trade barriers, create a common standard for intellectual property, enforce labour and environmental law standards and promote economic growth.
The agreement has come under severe criticism and scrutiny, however, for the policy of total secrecy during the years-long negotiations.
Others have criticised the more stringent intellectual property laws it would introduce, which could extend copyright terms and mean harsher penalties for file-sharers.
A number of trade unions and economists, such as Joseph Stiglitz, have said the agreement “serves the interest of the wealthiest”, and caters to the needs of corporations rather than the citizens of member nations.
Concerns have also been raised over the effect it could have on the cost of medicines – by extending the intellectual property rights of certain branded drugs, delays in the development of cheaper, ‘generic’ versions of these drugs could ensue, potentially leading to poorer people having to wait much longer than the wealthy to get access to the newest medicines.
The chapter on these intellectual property issues is what has been leaked by Wikileaks, and is one of the more controversial chapters in the whole agreement.
Peter Maybarduk, the program director at Public Citizen’s Global Access to Medicines, said that if the TPP is ratified, “people in the Pacific-Rim countries would have to live by the rules of this leaked text.”
“The new monopoly rights for big pharmaceutical firms would compromise access to medicines in TPP countries. The TPP would cost lives.”
The document, dated 5 October, was apparently produced on the day it was announced that the 12 member states to the treaty had reached an agreement after five and a half years of negotiations.
The nations of Vietnam, Peru, Mexico, Malaysia, Japan, Canada, Australia, USA, Singapore, New Zealand, Chile and Brunei are all prospective member states to the free-trade agreement, between them representing over 40 per cent of the world economy.
Despite the leak, the final text of the TPP is reportedly being held until after the Canadian general election, on 19 October.
While, as Wikileaks says, there still needs to a be a final “legal scrub” of the document before it is finished, negotiations on the document between signatories have now ended.